Cool security product I found today: EnTunnel from VanDyke software.
This is pretty cool if you need to create SSH tunnels. It will create all your tunnels when you startup Windows. And keep them alive.
Pretty handy for situations were your home cable ISP provider (Cox in my case) turns off the SMTP port. I happen to have access to an outside server that I can SSH to. This allows me to setup tunnels from my house that go to the outside server (via SSH) and then are translated back to SMTP.
Haven't been able to get AIM to work over an SSH tunnel. Maybe because it's UDP? Zebedee looks like it might do the trick, but I don't have a Zebedee server out there that I can use to test.
Another interesting tidbit from the newsgroups:
Netcat will happily pipe UDP into a TCP stream. On the client machine, you would want to do something like: nc -l -u -p syslog | nc localhost 9999 (as root, to bind to the syslog port) On your syslog server end, you'd do something like: nc -l -p 9999 | nc localhost -u syslog Setup your ssh tunnel from port 9999 on the client machine to port 9999 on the syslog server machine. Setup syslogd on the client to log the messages to localhost. Also, make sure that the client syslogd is set up to not receive messages from the network. You'll want to filter on the TCP listening port on the server to prevent people from DoS'ing you with spurious messages.
No comments:
Post a Comment